Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Servers:SAD-DUO01: Difference between revisions

From sysadminafterdark docs
(Created page with "SAD-DUO01 {{server-infobox |image = |Hostname = SAD-DUO01 |Type = VMware Virtual Machine |Site = Site:HME |Rack = Rack: HME-R01 |Role = Authentication |OS = Rocky Enterprise Linux 9 |CPUs = 2 Cores |Memory = 4 GiB |Hard Disks = 64GB, SAD-SAN01 (DS01) |Disk Controller = VMware Paravirtual |Network Adaptor= VMware VMXNET3 |IP Address= 10.1.30.8 |VLAN = Network: ProductionFrontend30 |Other Peripherals = None |Boot = UEFI }}")
 
No edit summary
 
Line 18: Line 18:
  |Boot = UEFI
  |Boot = UEFI
}}
}}
== History ==
[[Servers:SAD-DUO01]] was built on 5/20/22 to replace a pre-documentation server SAD-SSO01, which ran [https://goauthentik.io/ Authentik]. Authentik was a very good free and open source SSO solution that enabled internal users to authenticate to several internal services, such as [[Development:Gitlab]] on [[Servers:SAD-GIT01]].
However, MandolinSara and I decided it would be a good idea to get our multi-factor authentication services off premises in the event of an outage, a security threat, streamlined management and most important of all: easy two factor authentication for Windows and Linux servers. In addition, this enables us to protect certain consoles such as [[Disaster Recovery: VEEAM Backup & Replication]], [[Microsoft System Center: Microsoft System Center]], and [[Virtualization: VMware vCenter Server Appliance]]. For Duo's price point and added benefit, it was a no brainer to migrate things to a proprietary external service. If Authentik ever receives this functionality, a test server should be spun up to determine if the business should migrate back.
== Purpose ==

Latest revision as of 20:04, 19 May 2024

History

Servers:SAD-DUO01 was built on 5/20/22 to replace a pre-documentation server SAD-SSO01, which ran Authentik. Authentik was a very good free and open source SSO solution that enabled internal users to authenticate to several internal services, such as Development:Gitlab on Servers:SAD-GIT01.


However, MandolinSara and I decided it would be a good idea to get our multi-factor authentication services off premises in the event of an outage, a security threat, streamlined management and most important of all: easy two factor authentication for Windows and Linux servers. In addition, this enables us to protect certain consoles such as Disaster Recovery: VEEAM Backup & Replication, Microsoft System Center: Microsoft System Center, and Virtualization: VMware vCenter Server Appliance. For Duo's price point and added benefit, it was a no brainer to migrate things to a proprietary external service. If Authentik ever receives this functionality, a test server should be spun up to determine if the business should migrate back.

Purpose